Website Design | Web Design | Custom Website Design | Website Application Development | Web Development | Software Development

 

On-Appliance Reporting    Real-time visibility into network activities
Cyberoam’s on-appliance reporting delivers Layer 8 Identity-based visibility into user and network activity, offering real-time information regarding who is doing what across central and remote locations.

Cyberoam UTM appliances deliver in-depth reporting over the appliance, eliminating the need for an independent reporting solution and minimizing the resultant security investment and operational expense.

Back to Home
Feature Feature Description Benefit
Human Layer 8 Identity-based Security
User identity-based reports in dynamic Wi-Fi and shared endpoint environments in healthcare, educational institutions, retail stores and call centers
 
 
 
Visibility into who is doing what
 
Visibility into who is accessing which application
Instant identification of the source or destination endpoint under attack or perpetuating an attack
 
 
 
Helps prevent data leakage
 
Supports regulatory compliance requirements of CIPA, HIPAA, PCI DSS, GLBA
 
 
 
Shorter audit cycles
Security Reporting
Firewall & Internet activity
 
VPN activity
 
Intrusion Prevention reports
 
Spam reports
 
Virus reports
 
Web activity
 
Search Engine Query reports
 
Mail activity
 
IM activity
 
FTP activity
Real-time view of network activity
 
Supports instant security action
Compliance Reporting
HIPAA
 
GLBA
 
SOX
 
PCI DSS
 
FISMA
Supports compliance to regulatory requirements
 
Personalized View
Create custom dashboard
 
Bookmark important reports
 
View custom trends
 
Create custom reports
High flexibility to meet organizational requirements
 
Report Formats
View Formats – Tabular, Graphical
 
Print Formats – CSV, PDF
High flexibility to meet organizational requirements
 
 
Report sharing with the relevant departments and management
 
On-Appliance Reporting
Free reporting module over Cyberoam UTM appliances
 
Eliminates need for separate reporting solution
 
 
Minimizes security investment and operational expense involved in maintenance